標(biāo)題: Titlebook: Numerical Geology; A Source Guide, Glos Nicholas M. S. Rock Textbook 1988 Springer-Verlag Berlin Heidelberg 1988 CAM.database.formation.geo [打印本頁(yè)] 作者: injurious 時(shí)間: 2025-3-21 17:49
書(shū)目名稱Numerical Geology影響因子(影響力)
作者: 官僚統(tǒng)治 時(shí)間: 2025-3-21 22:39 作者: Dignant 時(shí)間: 2025-3-22 02:01
Section I. Introduction to geological computer use,作者: nonsensical 時(shí)間: 2025-3-22 07:56 作者: 暫時(shí)中止 時(shí)間: 2025-3-22 09:25
Section III: Interpreting data of one variable: Univariate statistics,作者: RLS898 時(shí)間: 2025-3-22 13:43
Section IV. Interpreting data with two variable: Bivariate statistics,作者: 壯麗的去 時(shí)間: 2025-3-22 20:58
978-3-540-50070-4Springer-Verlag Berlin Heidelberg 1988作者: ASSET 時(shí)間: 2025-3-22 23:13 作者: expdient 時(shí)間: 2025-3-23 02:41
Lecture Notes in Earth Scienceshttp://image.papertrans.cn/n/image/668993.jpg作者: 庇護(hù) 時(shí)間: 2025-3-23 06:14
https://doi.org/10.1007/BFb0045143CAM; database; formation; geology; programming; statistics作者: Pathogen 時(shí)間: 2025-3-23 13:43
Textbook 1988es succinct explanations of most statistical and mathematical terms. Computer topics include hardware, software, programming languages, databases, and communications graphics, CAO/CAM, CAI, GIS and expert systems. Statistical topics range from elementary properties of numbers through univariate, biv作者: laceration 時(shí)間: 2025-3-23 16:43 作者: cunning 時(shí)間: 2025-3-23 19:57 作者: 狂怒 時(shí)間: 2025-3-23 23:44
0930-0317 ary provides succinct explanations of most statistical and mathematical terms. Computer topics include hardware, software, programming languages, databases, and communications graphics, CAO/CAM, CAI, GIS and expert systems. Statistical topics range from elementary properties of numbers through univa作者: CAB 時(shí)間: 2025-3-24 03:10 作者: 尊敬 時(shí)間: 2025-3-24 09:16 作者: alabaster 時(shí)間: 2025-3-24 13:45
https://doi.org/10.1007/978-3-030-03068-1al government of Malawi based on the strategy of enforcement and sanctions have proved largely ineffective leading to the persistence of this governability challenge. An alternate perspective is sought in this chapter by emphasizing people’s fundamental notions such as values, images and principles.作者: Bmd955 時(shí)間: 2025-3-24 18:32
n member, thyroid-stimulating hormone (TSH), make up the glycoprotein hormone family. FSH is used for ovulation induction and development of multiple follicles in the ovulatory patient participating in assisted reproduction and is also used in men for the induction of spermatogenesis. Ovarian enlarg作者: conjunctiva 時(shí)間: 2025-3-24 19:52
Marcel van Oijen,Mark Brewerts as in the one-dimensional ease. The use of theta functions, particularly since Mumford‘s work, has been an important tool in the study of abelian varieties and invertible sheaves on them. Also, abelian varieties play a significant role in the geometric approach to modern algebraic number theory. 作者: spinal-stenosis 時(shí)間: 2025-3-25 03:07 作者: 發(fā)微光 時(shí)間: 2025-3-25 04:15
terest due to their small sizes and reasonable computational power. For example, body worn sensors are widely used to monitor daily life activities and identify meaningful events. Hence, the capability to detect, adapt and respond to change performs a key role in various domains. A change in activit作者: expansive 時(shí)間: 2025-3-25 10:44 作者: Rebate 時(shí)間: 2025-3-25 12:58
On the Difficulty of Inferring Gene Regulatory Networks: A Study of the Fitness Landscape Generated as an optimization problem, the typical goal is to minimize the value of an error measure, such as the relative squared error, between the real profiles and those generated with a model whose parameters are to be optimized. In this paper, we use dynamic recurrent neural networks to model regulatory作者: defuse 時(shí)間: 2025-3-25 16:06
A Multi-user Based Watermarking System with Two-Security-Level Keysnly in the host image, and only the user with the first-class key can extract the original watermark directly; other users with the second-class keys can only extract the shadow watermarks. The watermark can also be obtained by combining all the shadow watermarks.作者: 單獨(dú) 時(shí)間: 2025-3-25 21:43
Finding Optimal Solutions to Atomix-complete. An implementation of the heuristic algorithm A. is presented that needs no priority queue, thereby having very low memory overhead. The limited memory algorithm IDA. is handicapped by the fact that, due to move transpositions, duplicates appear very frequently in the problem space; severa作者: aspect 時(shí)間: 2025-3-26 01:06
A Hardware Architecture for SIFT Candidate Keypoints Detection. The implementation of this architecture on a FPGA (Field Programmable Gate Array) and its reliability tests are also presented. The obtained features are very similar to Lowe’s. The system is able to detect scale-space extrema on a 320 ×240 image in 3 ms, what represents a speed up of 250x compare作者: Substance-Abuse 時(shí)間: 2025-3-26 07:08
Women and Paid Work: Prospects for Equality,w would now take exception to the contention in the first part of the quote cited above, yet the elimination of privileges and perceived disabilities is a complex objective, especially when there is disagreement about what constitutes both privileges and disabilities. The concepts of equality and eq作者: STYX 時(shí)間: 2025-3-26 09:52 作者: Calculus 時(shí)間: 2025-3-26 15:41 作者: eardrum 時(shí)間: 2025-3-26 18:18 作者: burnish 時(shí)間: 2025-3-26 22:29 作者: Exploit 時(shí)間: 2025-3-27 02:41 作者: 舉止粗野的人 時(shí)間: 2025-3-27 08:38 作者: MAPLE 時(shí)間: 2025-3-27 11:00 作者: 冒號(hào) 時(shí)間: 2025-3-27 17:30
Myeloma-Related Hypercalcemia and Bone Disease,sis of myeloma bone disease. Furthermore, this insight has translated into novel therapies for bone disease. In this review, we highlight our current understanding of the pathogenesis and management of myeloma bone disease.作者: 狂怒 時(shí)間: 2025-3-27 20:15 作者: RENAL 時(shí)間: 2025-3-27 22:58